Just about 39% of all Counter-Strike 1.6 servers were being used to push malware to end users. It’s amazing that still to this day counter-strike 1.6 is still being play after 20 years. The game still has many players and … Read the rest

Not keeping up with HIPAA regulations can be quite costly for any physician’s office or entity that needs to adhere to compliance. HIPAA Violation fines range from $100 to over $4 Million. Staying compliant is not an easy task, regulations … Read the rest

The new norm with cybersecurity is discovering new attack methods and new threats which emerge daily and new vectors that are being tested by cyber criminals, according to the 2019 Webroot Threat Report.

According to the Webroot Threat Report

The Ubiquiti UniFi Security Gateway Pro (USG-PRO-4)is a is an enterprise Gateway Router with Gigabit Ethernet and two combination SFP/RJ45 ports, combining reliable security features with high-performance routing technology in a cost-effective unit.

Lets Review The Basics…

There are occasions where you will need to know How To Ping With Date and Time To TXT File Using CMD and a few Windows Ping commands can help. This will use a provide a date and a timestamp the … Read the rest

The Zeus and Sphinx Banking Trojan is showing off its ugly face more often now during COVID19, lurking and targeting desperate users looking for information about COVID19.

According to researchers Amir Gandler and Limor Kessem at IBM X-Force, the researchers … Read the rest

How many Horrible Passwords are there? Let me tell you there are about 500 of them and we will show you the TOP Horrible Passwords To Use For 2020. Any password documented publicly or available in the darkweb can be … Read the rest

No one can predict the future; however, you can be ready with a sound CoronaVirus Business Continuity Plan. This CoronaVirus business continuity checklist is the first step in the BCP process. The checklist is not an exhaustive list, it is … Read the rest

As the Covid-19 pandemic rises scammers are now using the fear of the public to capitalize by using a method of email phishing to steal money and data.

World Health Organisation Advice

Unpatched systems are still a major attack vector for hackers. These unpatched systems can invite major troubles for an organization. The issue can turn worse when the organization falls victim to a data breach and compromises confidential data.